org.apache.james:james-server-data-file@3.2.0 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.apache.james:james-server-data-file package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Information Exposure

Affected versions of this package are vulnerable to Information Exposure such that using temporary files with insecure permissions by the Apache James server allows an attacker with local access to access private user data in transit.

Note: Vulnerable components include the SMTP stack and IMAP APPEND command.

How to fix Information Exposure?

Upgrade org.apache.james:james-server-data-file to version 3.7.3 or higher.

[0,3.7.3)
  • M
Directory Traversal

Affected versions of this package are vulnerable to Directory Traversal via maildir mailbox store and Sieve file repository which enables a user to access other users' data stores.

Note: This is due to an incomplete fix to CVE-2021-40525.

How to fix Directory Traversal?

Upgrade org.apache.james:james-server-data-file to version 3.6.2 or higher.

[,3.6.2)
  • C
Directory Traversal

Affected versions of this package are vulnerable to Directory Traversal due to improper implementation of ManagedSieve and the file storage for sieve scripts, which allows attackers reading and writing any file.

Note: This could also be mitigated by ensuring manageSieve is disabled, which is the case by default.

How to fix Directory Traversal?

Upgrade org.apache.james:james-server-data-file to version 3.6.2 or higher.

[0,3.6.2)